Search for tag: "institute"

Gleb Yushin - Next Generation Materials as the Foundation for Future Li-Ion Batteries

During the last 30 years the evolutionary improvements in lithium-ion battery (LIB) technologies increased LIB volumetric and gravimetric energy densities by over 3 times and reduced cell price by up…

From  Katie Gentilello 3 plays 0  

David N. Ku - Novel Ways to Use POC and Nanotechnology in Clinical Medicine

Nano and microtechnologies have a big potential to aid in the diagnosis and treatment of a wide range of diseases. In this seminar, I will highlight three examples that may be unusual to the…

From  Katie Gentilello 4 plays 0  

Ann Majewicz Fey - From Tool to Assistant: Towards Developing Adaptive Surgical Robots for the Operating Room

Human-generated, preventable errors, particularly those made intra-operatively, can lead to morbidity and mortality for thepatient poor training outcomes for residents, and high costs for the…

From  Katie Gentilello 2 plays 0  

Josiah Dykstra - Invisible Security: Protecting Users with No Time to Spare

For over 50 years, the cybersecurity community has sought to protect vulnerable systems and users from victimization. Despite ongoing and valiant work at adoption and usability, some users cannot or…

From  Katie Gentilello 20 plays 0  

Matthew T. Mason - Robotics and Warehouse Automation at Berkshire Grey

This talk tells the Berkshire Grey story, from its founding in 2013 to its IPO earlier this year — the first robotics IPO since iRobot over 15 years ago. Berkshire Grey produces automated…

From  Katie Gentilello 25 plays 0  

Yue Chen - Tentacle-like Continuum Robots for Minimally Invasive Surgery

Intelligent animals are able to safely interact with their environments, whether those environments are hard or soft, and over a wide range of geometry. Modern robots made from serially arranged…

From  Katie Gentilello 13 plays 0  

Nadiya Kostyuk - Deterrence in the Cyber Realm: Public versus Private Cyber Capacity

Can cyber deterrence work? Existing scholarly works argue that deterrence by punishment using cyberattacks is ineffective because the difficulty of attributing the origin of cyberattacks makes the…

From  Katie Gentilello 15 plays 0  

Jonathan Fuller, Carter Yagemann, Sena Sahin - GT Cybersecurty Students Preview Research Appearing at ACM Computer and Communications Security Conference (CCS)

Jonathan Fuller, c3pO: Large-Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration Current techniques to monitor botnets towards disruption or takedown are…

From  Katie Gentilello 17 plays 0  

Sourabh Saha - Projection Two-Photon Lithography for Rapid and Versatile Nanoscale 3D Printing

High-throughput fabrication techniques for generating arbitrarily complex three-dimensional structures with nanoscale features are desirable across a broad range of applications including healthcare,…

From  Katie Gentilello 3 plays 0  

Sehoon Ha - Learning to walk and navigate on legged robots

Recent advances in both software and hardware opened a new horizon of robotics: artificial intelligence discovered dynamic motions in simulation and hardware became powerful enough to execute…

From  Katie Gentilello 8 plays 0  

Chris Rouland - A Random Walk Through 1,000,000 Things

From  Katie Gentilello 3 plays 0  

Yongzhi Qiu - Novel hydrogel-based microvasculature-on-chips for studying microvascular occlusion and thrombosis in disease

Microvascular dysfunction is associated with the pathophysiology of many diseases, such as sickle cell disease. However, due to the small size scale and its location deep inside the tissues, the…

From  Katie Gentilello 0 plays 0  

Carlos Silva - Exciton Polarons in Two-Dimensional Hybrid Metal-Halide Perovskites

While polarons --- charges bound to a lattice deformation induced by electron-phonon coupling --- are primary photoexcitations at room temperature in bulk metal-halide hybrid organic-inorganic…

From  Katie Gentilello 5 plays 0  

Joseph Jaeger - Bridging the Theory and Practice of Cryptography

Cryptography is deployed at scale to protect data, both in transit and at rest. However, protocols are often designed or even deployed aiming for security that extends beyond what is formally…

From  Katie Gentilello 41 plays 0  

Judy Hoffman - Understanding and Mitigating Bias in Vision Systems

As visual recognition models are developed across diverse applications; we need the ability to reliably deploy our systems in a variety of environments. At the same time, visual models tend to be…

From  Katie Gentilello 17 plays 0  

William Robertson - How I Learned to Stop Worrying and Love the Bug

Software bugs underlie many security vulnerabilities, and have proven impossible to eradicate in practical settings. Indeed, new bugs and classes of bugs are found all the time, and one can safely…

From  Katie Gentilello 15 plays 0